{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:12:17Z","timestamp":1771657937605,"version":"3.50.1"},"reference-count":46,"publisher":"Zhejiang University Press","issue":"4","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1631\/fitee.2000546","type":"journal-article","created":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T08:05:51Z","timestamp":1648800351000},"page":"587-603","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Detection and localization of cyber attacks on water treatment systems: an entropy-based approach","\u6c34\u5904\u7406\u7cfb\u7edf\u7f51\u7edc\u653b\u51fb\u7684\u68c0\u6d4b\u548c\u5b9a\u4f4d:\u57fa\u4e8e\u71b5\u7684\u65b9\u6cd5"],"prefix":"10.1631","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3386-7359","authenticated-orcid":false,"given":"Ke","family":"Liu","sequence":"first","affiliation":[]},{"given":"Mufeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rongkuan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Zhenyong","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0288-0086","authenticated-orcid":false,"given":"Qiang","family":"Wei","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2022,4,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/etfa.2012.6489745"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/e17042367"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2010.2099234"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23265"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23142"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tie.2011.2181132"},{"issue":"4","key":"ref9","first-page":"042030","article-title":"A survey of industrial control system testbeds","volume-title":"IOP Conf Ser Mater Sci Eng","volume":"569","author":"Geng","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.05.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/etfa.2009.5347134"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.027"},{"key":"ref13","article-title":"ICS-CERT Annual Assessment Report. Technical Report. NCCIC\/ICS-CERT, Washington DC, USA","year":"2016","journal-title":"ICS-CERT"},{"key":"ref14","article-title":"Threat Landscape for Industrial Automation Systems. H2 2018. Kaspersky","year":"2019","journal-title":"Kaspersky ICS CERT"},{"key":"ref15","article-title":"Targeted Attacks on Israeli Water Supply and Wastewater Treatment Facilities","year":"2020a","journal-title":"Kaspersky ICS CERT"},{"key":"ref16","article-title":"Threat Landscape for Industrial Automation Systems. Vulnerabilities Identified in 2019. Kaspersky","year":"2020b","journal-title":"Kaspersky ICS CERT"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: techniques, datasets and challenges","volume":"2","author":"Khraisat","year":"2019","journal-title":"Cybersecurity"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2014.1169"},{"key":"ref19","article-title":"Industroyer\/ Crashoverride: Zero Things Cool about a Threat Group Targeting the Power Grid","author":"Lee","year":"2017","journal-title":"Technical Report. Black Hat, USA"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2459982"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/cicybs.2011.5949392"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/isrcs.2011.6016083"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2931349"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/sai.2014.6918252"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/cyswater.2016.7469060"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/hicss.2012.78"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5120\/10160-5084"},{"key":"ref28","article-title":"Common Cybersecurity Vulnerabilities in Industrial Control Systems","author":"Nelson","year":"2011","journal-title":"Technical Report. The U.S. Department of Homeland Security (DHS) National Cyber Security Division, Washington DC, USA"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2015.2443793"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/prdc.2009.38"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/mitp.2013.7"},{"key":"ref32","article-title":"Attackers Alter Water Treatment Systems in Utility Hack","year":"2016","journal-title":"SecurityWeek"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.cose.2019.03.009","article-title":"Abnormal detection method of industrial control system based on behavior model","volume":"84","author":"Song","year":"2019","journal-title":"Comput Secur"},{"key":"ref34","article-title":"Guide to Industrial Control Systems (ICSs) Security","author":"Stouffer","year":"2011","journal-title":"NIST Special Publication 800\u201382"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177728730"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/tsmca.2010.2048028"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/eurospw.2017.62"},{"key":"ref38","article-title":"Iranian Hackers Infiltrated New York Dam in 2013","year":"2015","journal-title":"The Wall Street Journal\u2019s San Francisco Bureau"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/isrcs.2009.5251357"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/cicybs.2011.5949394"},{"key":"ref41","author":"Walton","year":"2016","journal-title":"Water Sector Prepares for Cyberattacks"},{"key":"ref42","first-page":"156","article-title":"Intrusion detection of industrial control system based on Modbus TCP protocol","volume-title":"Proc 13th IEEE Int Symp on Autonomous Decentralized System","author":"Wang","year":"2017"},{"key":"ref43","article-title":"Critical Infrastructure","year":"2020a","journal-title":"Wikipedia"},{"key":"ref44","article-title":"Water Treatment","year":"2020b","journal-title":"Wikipedia"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/seccomw.2006.359549"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2891261"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2000546.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2000546\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2000546.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:43:05Z","timestamp":1771656185000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2000546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4]]},"references-count":46,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["1784"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2000546","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4]]},"assertion":[{"value":"13 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}